时间:2019-02-17 作者:英语课 分类:PBS访谈社会系列


英语课

   There is new information today about Russia obtaining highly classified information about how the U.S. military protects its computer networks and how it conducts electronic spying.


  Hari Sreenivasan has that story.
  The Wall Street Journal reports on a web of breaches 1.
  First, classified material was stolen from the National Security Agency by a contractor 2.
  His computer was then hacked 4, and Russia took the sensitive data.
  The article doesn't say who the contractor was, but that he used Kaspersky Lab antivirus software, which is believed to be compromised by Russian intelligence.
  For more on all of this, we turn to Shane Harris, who broke the story, covering national security and intelligence issues for The Wall Street Journal.
  Shane, what do we know that was compromised? What do the Russians have?
  Well, what we are told this is that was information that describes or deals with offensive and defensive 5 computer network operations at NSA,
  so, basically the tools and techniques, the codes that the NSA would use to hack 3 into foreign computer systems
  and the tools and techniques they use to protect computer networks inside the United States.
  This is very critical information that goes to what intelligence agencies call sources and methods,
  and it's the kind of thing that is most jealously guarded inside the NSA and is extremely classified.
  And the Kaspersky Lab software, that wasn't at his desktop 6 at the NSA. This was at his home.
  No. What happened was the contractor removed this classified information unauthorized from his workplace and took it home, we are told,
  to work on it there, is what authorities believe, and loaded it on to a personal computer.
  And that computer was running the Kaspersky antivirus product. This is a commercially available antivirus product.
  Probably many watching this tonight may have it on their own home computers.
  And what authorities believe is that that system was then used to alert hackers 7 in Russia to the files that were on his machine, which were then removed from it by Russia.
  So the software that is scanning his computer, looking for sensitive files, sends a message to Russia saying,
  hey, here is a sensitive file, and since they have some sort of a backdoor, they can access it?
  Well, there is a sequence here that we're still not entirely 8 sure, but, essentially 9, yes, this is the idea,
  that it alerts people back in Russia, who are then able to take advantage,
  knowing what they know, from the software, then home in on this individual's computer and obtain this information.
  Now, it is important to say that Kaspersky says they do not provide any kind of access that is unauthorized or illegal,
  and they do not participate in computer operations of this nature, cyber-spying on behalf of governments.
  So there still is some question about the sequence of events.
  But what officials have concluded is that, if not for this Kaspersky product, they do not believe that this information would have been obtained.
  Now, just a couple of weeks ago, we had members of the Intelligence Committees -- members of intelligence community sitting in front of the Senate panel.
  And when they were asked whether or not they would put this kind of software on their own computers, they unanimously said no.
  And it looks like the government's already taking steps to try to make sure that this software is not available to government agencies, right?
  That's right. In fact, last month, the Homeland Security Department issued a directive
  prohibiting all federal departments and agencies in the U.S. government from either buying these products and services from Kaspersky or using them.
  And they were told to get rid of them if they were using them.
  That is an extraordinary measure for the government to take. This is a product that is sold in America.
  It has been sold, been sold in big box stores. So that really underscored the extent to which officials,
  we're told, believed that this tool was being used to conduct espionage 10 inside the United States.
  And let's talk a little bit about the timeline. When did this hack happen,
  I mean, given the context of all that we're investigating about Russia and their influence on the elections?
  What we know so far is that the incident itself occurred in 2015, but it wasn't discovered until the spring of 2016.
  So this would be before the election campaign really kicked off in earnest.
  But what is interesting about that spring 2016 period is that is when intelligence agencies
  now say that they were starting to detect the first signs of Russia beginning to interfere 11 in the U.S. elections.
  Now, we don't know that there is a direct line between what was going on with this contractor and that activity,
  but it does appear that there may have to some degree been coincident,
  and that the activity against the contractor may have even preceded the Russian interference in the elections,
  and certainly preceded the period before which the U.S. government really became more alert to that.
  All right, Shane Harris of The Wall Street Journal, thanks so much. Thank you. undefined

破坏( breach的名词复数 ); 破裂; 缺口; 违背
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
n.订约人,承包人,收缩肌
  • The Tokyo contractor was asked to kick $ 6000 back as commission.那个东京的承包商被要求退还6000美元作为佣金。
  • The style of house the contractor builds depends partly on the lay of the land.承包商所建房屋的式样,有几分要看地势而定。
n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
adj.防御的;防卫的;防守的
  • Their questions about the money put her on the defensive.他们问到钱的问题,使她警觉起来。
  • The Government hastily organized defensive measures against the raids.政府急忙布置了防卫措施抵御空袭。
n.桌面管理系统程序;台式
  • My computer is a desktop computer of excellent quality.我的计算机是品质卓越的台式计算机。
  • Do you know which one is better,a laptop or a desktop?你知道哪一种更好,笔记本还是台式机?
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
ad.全部地,完整地;完全地,彻底地
  • The fire was entirely caused by their neglect of duty. 那场火灾完全是由于他们失职而引起的。
  • His life was entirely given up to the educational work. 他的一生统统献给了教育工作。
adv.本质上,实质上,基本上
  • Really great men are essentially modest.真正的伟人大都很谦虚。
  • She is an essentially selfish person.她本质上是个自私自利的人。
n.间谍行为,谍报活动
  • The authorities have arrested several people suspected of espionage.官方已经逮捕了几个涉嫌从事间谍活动的人。
  • Neither was there any hint of espionage in Hanley's early life.汉利的早期生活也毫无进行间谍活动的迹象。
v.(in)干涉,干预;(with)妨碍,打扰
  • If we interfere, it may do more harm than good.如果我们干预的话,可能弊多利少。
  • When others interfere in the affair,it always makes troubles. 别人一卷入这一事件,棘手的事情就来了。
标签: PBS
学英语单词
adustion of timbering
agricultural and technical college
amrich
Antakiya
arc air gouging
atrionector
automatic checkout
automatic generator field regulator
ball spark gap
battle group
BDFL
beyond the pales of
blind pools
blousons
bromobenzylcyanide
cast reservoir
cement and sand cushion
checkerboard colour dot screen
coaxial capacitor
code trace
conjunctival concretion
Connectionless-Oriented Network Service
constant-vltage generator
crown roasts
disagyse
elapsed time meter
environmentally damaging activities
ethyl thiocyanide
evaluations
evaporation value
existing assets
finger mount
flocculent turbidity
full-page display
gaseous phase chromatograph
glandulae Parotis
go cycling
green papers
hanwags
headmistressship
hemovolumetry
hnst
homicide resulting from passion
homoeriodictyol
iliocostal muscle of thorax
inadapted river
intensive
Ishtar Gate
joke shop
Kandanos
kerationous
language dependent parameter
leechliker
light etching
LONH
lowd
lowest-costs
made ground
membrane shell
memory address selector
merbiruelidin
montauk
Neiguan (P6)
nigrosine
nuclei nervi trochlearis
oligydria
one-sided limit
palatinal
payage
photorespiratory
pound one's dummy
precision instrumentation radar
product proximity space
Pu'ukoli'i
re-gifting
reacting substance
reducing action
ring-like space
root plugger
sailor's shore pass
satellite photographic studies
sige gate
single-row stage
sky wave.
sleddog
SOREMP
spiceful
take hostage
thai-inspired
thrust reverse nozzle
tie-dyest
tiravanija
totus, teres, atque rotundus
tungsten-cobalt-titanium alloy
undecoct
urban development strategy
urocyclid
vacuum-operated sheet piler
vapour-reflux contacting
wigman
window oysters
wrench jaw